Recent Blogs
 As of today, October 14, 2025, Microsoft is officially ending support for Windows 10. This means that Windows 10 devices will no longer receive security or feature updates, nor technical support from...
Oct 14, 20253.2KViews
2likes
1Comment
 We’re excited to announce a key milestone in Defender’s multi-tenant management journey—Microsoft Defender for Endpoint security policies can now be distributed across multiple tenants from the Defen...
Aug 07, 20252KViews
3likes
0Comments
 Network isolation refers to how Microsoft Defender for Endpoint restricts a compromised device’s communication within the network in order to contain threats and prevent lateral movement. But oftenti...
Jun 25, 20251.2KViews
1like
0Comments
 Microsoft has a long-standing relationship with MITRE and holds deep respect for the unique role that the organization plays within the security ecosystem.  MITRE ATT&CK® Evaluations have been instru...
Jun 13, 20252.9KViews
1like
0Comments
3 MIN READ
 Enhancing macOS security with behavior monitoring  
 As attackers become more sophisticated in today’s rapidly evolving threat landscape, security strategies must continue to innovate to keep pace. F...
Jun 10, 20252.4KViews
0likes
0Comments
 Create and manage global exclusions for Linux  
 Global exclusions for Microsoft Defender for Endpoint on Linux are now generally available. This will allow security teams to create and manage exclus...
Jun 05, 20251.3KViews
4likes
1Comment
6 MIN READ
 Protecting critical assets  
 Traditional security solutions often operate in a one-size-fits-all alert model that treats every detection equally, regardless of how important the asset is. But not al...
May 27, 20252.7KViews
1like
0Comments
 The rise of tampering attacks 
 In cybersecurity, anti-tampering protection refers to the defensive measures designed to prevent unauthorized modifications to security systems, policies, and settings...
May 15, 20252.3KViews
1like
1Comment
 The modern threat landscape is rapidly evolving, with new attack strategies being employed at greater frequency and volume than we have seen in the past. One such tactic we have recently observed acr...
Feb 05, 20256KViews
4likes
3Comments
 Endpoint security solutions collect large amounts of data from across your network in order to detect intruders. These signals are quickly processed to generate prompt, valuable security alerts and i...
Jan 22, 20252.9KViews
2likes
1Comment
Resources
Tags
- microsoft defender for endpoint48 Topics
- Advanced hunting20 Topics
- macos15 Topics
- linux13 Topics
- Mobile Threat Defense9 Topics
- android8 Topics
- EDR7 Topics
- Backward support6 Topics
- webinar5 Topics
- apis5 Topics